Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-15002

Опубликовано: 28 дек. 2018
Источник: nvd
CVSS3: 4.7
CVSS2: 1.9
EPSS Низкий

Описание

The Vivo V7 device with a build fingerprint of vivo/1718/1718:7.1.2/N2G47H/compil11021857:user/release-keys allows any app co-located on the device to set system properties as the com.android.phone user. The com.qualcomm.qti.modemtestmode app (versionCode=25, versionName=7.1.2) that contains an exported service named com.qualcomm.qti.modemtestmode.MbnTestService that allows any app co-located on the device to provide key-value pairs to set certain system properties. Notably, system properties with the persist.* prefix can be set which will survive a reboot. On the Vivo V7 device, when the persist.sys.input.log property is set to have a value of yes, the user's screen touches be written to the logcat log by the InputDispatcher for all apps. The system-wide logcat log can be obtained from external storage via a different known vulnerability on the device. The READ_EXTERNAL_STORAGE permission is necessary to access the log files containing the user's touch coordinates. With some effort, t

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:vivo:v7_firmware:7.1.2:*:*:*:*:*:*:*
cpe:2.3:h:vivo:v7:-:*:*:*:*:*:*:*

EPSS

Процентиль: 18%
0.00058
Низкий

4.7 Medium

CVSS3

1.9 Low

CVSS2

Дефекты

CWE-532

Связанные уязвимости

CVSS3: 4.7
github
больше 3 лет назад

The Vivo V7 device with a build fingerprint of vivo/1718/1718:7.1.2/N2G47H/compil11021857:user/release-keys allows any app co-located on the device to set system properties as the com.android.phone user. The com.qualcomm.qti.modemtestmode app (versionCode=25, versionName=7.1.2) that contains an exported service named com.qualcomm.qti.modemtestmode.MbnTestService that allows any app co-located on the device to provide key-value pairs to set certain system properties. Notably, system properties with the persist.* prefix can be set which will survive a reboot. On the Vivo V7 device, when the persist.sys.input.log property is set to have a value of yes, the user's screen touches be written to the logcat log by the InputDispatcher for all apps. The system-wide logcat log can be obtained from external storage via a different known vulnerability on the device. The READ_EXTERNAL_STORAGE permission is necessary to access the log files containing the user's touch coordinates. With some effort...

EPSS

Процентиль: 18%
0.00058
Низкий

4.7 Medium

CVSS3

1.9 Low

CVSS2

Дефекты

CWE-532